Analysis
-
max time kernel
133s -
max time network
132s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
28-01-2022 22:22
Static task
static1
Behavioral task
behavioral1
Sample
113232ed76536c2255f972f4bb2e3d2aafd01b643da83a04eb80f1809729a898.vbs
Resource
win7-en-20211208
General
-
Target
113232ed76536c2255f972f4bb2e3d2aafd01b643da83a04eb80f1809729a898.vbs
-
Size
14KB
-
MD5
8eb68a7cde7da57b6bb46b479b371067
-
SHA1
2e8c15856c3f76744c1d73d9ca90db19621263b4
-
SHA256
113232ed76536c2255f972f4bb2e3d2aafd01b643da83a04eb80f1809729a898
-
SHA512
01189fd288820c94c6aaaee42c50612c2da6761cf4f734a79cc5600bace0fd9cde82bb47bfa5d672bc3b737f3996778a532d6c4dde73dbfbd9bd4424148286aa
Malware Config
Signatures
-
Blocklisted process makes network request 4 IoCs
Processes:
WScript.exeflow pid process 24 2748 WScript.exe 26 2748 WScript.exe 28 2748 WScript.exe 30 2748 WScript.exe -
Drops startup file 1 IoCs
Processes:
wscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\egyiisgvtqc.lnk wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 15 IoCs
Processes:
LogonUI.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
wscript.exedescription pid process Token: SeShutdownPrivilege 1216 wscript.exe Token: SeShutdownPrivilege 1216 wscript.exe Token: SeShutdownPrivilege 1216 wscript.exe Token: SeShutdownPrivilege 1216 wscript.exe Token: SeShutdownPrivilege 1216 wscript.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
LogonUI.exepid process 1608 LogonUI.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
WScript.exedescription pid process target process PID 2748 wrote to memory of 1216 2748 WScript.exe wscript.exe PID 2748 wrote to memory of 1216 2748 WScript.exe wscript.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\113232ed76536c2255f972f4bb2e3d2aafd01b643da83a04eb80f1809729a898.vbs"1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\System32\wscript.exewscript.exe C:\Users\Admin\AppData\Roaming\egyiisgvtqc.vbs2⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
PID:1216
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x0 /state0:0xa3ad2855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:1608
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
689289ce154112fe8dbfc2674cf0c4c1
SHA1d68495ccfbb01ff0e8e868e63a09aa3d83d4aa7d
SHA2562a400cc629111018c9076639cab5e3268f0d5c22357380593b7c39d86e1e30c9
SHA5123edfd9fa380a1b398e73c8dfac55eb2d5c64dc1cb74f599a1fadd2105d503bce8ff9f21804451725a12f286d6d649d9e458ac61edba10e4dbba62405d50225fd
-
MD5
e6b93d809f2200a1f2ab4923069cf7cf
SHA1866cabddfde63fe0e132abc5bb11b5521b46fa32
SHA2560371814b236801c55ff69a7944f21d6139f05a8163d5e67f560f6932eb0024c7
SHA512ec36d2a79fc015057770333ce8efe4470f9621914919680d60cf5644f19c7a1c832e09777c4dbbb8080d28627ae905073df6906a96099574dd2aff4c84f54d87